STAR Registry Listing for

Cisco Secure Email

Founded in 2013 by the Cloud Security Alliance, the Security Trust Assurance and Risk (STAR) registry encompasses key principles of transparency, rigorous auditing, and cloud security and privacy best practices.

Cisco Secure Email Logo

Cisco Secure Email

Cisco Secure Email includes advanced threat protection capabilities to detect, block, and remediate threats faster, prevent data loss, and secure important information in transit with end-to-end encryption.

With Cisco Secure Email, customers can:

● Detect and block more threats with superior threat intelligence from Talos™, our threat research team.

● Combat ransomware hidden in attachments that evade initial detection with Cisco Secure Email Malware Defense and Cisco Threat Grid.

● Drop emails with risky links automatically or block access to newly infected sites with real-time URL analysis to protect against phishing and BEC.

● Prevent brand abuse and sophisticated identity-based email attacks with Cisco Secure Email Domain Protection and Cisco Secure Email Phishing Defense services.

● Protect sensitive content in outgoing emails with Data Loss Prevention (DLP) and easy-to-use email encryption, all in one solution.

● Provide user behavior training with Cisco Secure Awareness Training to help users work smarter and safer.

● Maximize deployment flexibility with a cloud, virtual, on-premises, or hybrid deployment or move to the cloud in phases.

● Integrate across a growing number of Cisco Security products and accelerate key security operations functions like visibility, detection, automation, investigation, and remediation with SecureX.

View other services by Cisco Systems:

Organizations who have the CSA Trusted Cloud Provider seal demonstrate a commitment to organizational security. They are a CSA Corporate Member volunteer regularly for CSA, and have at least one staff member who has earned their CCSK.
Information about Cisco Secure Email
Listed Since: 04/21/2022
Last Updated: 04/21/2022

Level 1: Self-Assessment

At level one organizations can submit one or both of the security and privacy self-assessments. These are based off of the Cloud Controls Matrix and the CSA Code of Conduct for GDPR Compliance.

Security Self-Assessment
Consensus Assessments Initiative Questionnaire v4.0.2
Offers an industry-accepted way to document what security controls exist in IaaS, PaaS, and SaaS services. It provides a set of Yes/No questions a cloud consumer and cloud auditor may wish to ask of a cloud provider to ascertain their compliance to the CSA Cloud Controls Matrix (CCM).